Technology Trends, Chief Technology Officer, CTO, Blockchain, Security Breach, Design Thinking Process, Passwords, End-Point, Agile Adoption, technology consulting, Artificial Intelligence, GDPR, Digital Experience, Digital Transformation, Security, InfoSec

Our Top 10 Favourite Blog Topics From 2018

2018 has been a year of rapid technology growth. We have seen changes to the security landscape, an increased adoption of AI and continued generational adjustments to our workforce.  As we look back over the last 12 months, we wanted to share some of our favorite blog posts from 2018 that touch on some or all of these topics: from risk and security assessment, to user experience, design thinking, business consulting, and everything in between. Happy reading!

Read More
By Jamie Michie on Dec 10, 2018 1:07:47 PM
HP, End-Point, NetworkSecurity, Malware, Printer, SimonShiu, SecurityLab, HPComputers, BlackHat2018, ConnectionInspector, JetAdvantage, NSA, DoD, cryptographer

Who Thinks of HP for End-Point Security?

Honestly, that was my first thought when I started looking at the marketing material HP had put together for Black Hat 2018 this year.

HP has been promoting its efforts to provide security to its enterprise printers for the past couple of years and has done a great job at offering secure solution. They have even involved the security research community by introducing a first-of-its kind enterprise printer bug bounty program. 

But end-point security? HP makes printers. What do they know about protecting end-points like desktops or laptops?

Read More
By Jeff Man on Nov 7, 2018 1:50:00 PM